As of Monday 18 September, WatchGuard Customer Support is pleased to announce some upcoming improvements to our phone system. We are integrating our phone system and CRM systems so that we can automatically find your account and contact information when you call in for support. We will use your phone number, either the number you call from or a number manually entered by you when you call, to locate your details within our system. We will use this information to prioritize your call and route your call to the correct support representative. We have also made some minor improvements to our language specific lines.

What to expect

Two new options when you call in to WatchGuard Technical Support:

You can select the language you want to be supported in (English, Spanish, French, Italian, Japanese, Mandarin)

You can confirm the best phone number for us to use to find your account information

Introduction of Business Hours for our language-specific phone lines:

The language-specific phone lines will open and close depending on customer time zone

During closed hours, customers who call a language-specific line will be given the option to leave a voicemail for the next available language speaker or to be transferred to an English-speaking representative

What you need to do

To prepare for these changes, we recommend that you log in to the WatchGuard website to verify your contact information is correct. We will use the phone numbers in your Profile to find your account when you call in. To review and update your profile information, click here. For more information about how to update your profile, you can also watch this video tutorial.

Share this entry

http://firedot.nl/wp-content/uploads/2017/08/logo-firedot-zologic-300x113.png00Fireboss7102http://firedot.nl/wp-content/uploads/2017/08/logo-firedot-zologic-300x113.pngFireboss71022017-09-14 21:05:142017-09-14 21:05:14Updates to Customer Support Phone System

Firedot Highlight Reports

Getting threat intelligence into your existing security products – SIEMs, endpoints, network tools — can significantly enhance their effectiveness. Here at Anomali we understand the value of product integrations, so much so that my entire job is to manage the 30+ we currently offer. Recently we launched a feature that allows you to create your own threat […]

The intelligence in this week’s iteration discuss the following threats: Compromised server, Cryptocurrency miner, Data theft, Malspam, Phishing, Targeted attacks, Underground markets, and Vulnerabilities. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity. Trending Threats Olympic Destroyer Takes Aim At Winter […]

In our last post, we talked about how companies can use the concept of a No-Fly list to keep malicious actors out of their networks. So how does a cyber No-Fly list work in a real situation? We spoke with one of our customers, Alaska Airlines, about how they make the most of threat intelligence […]

My name is Teddy Powers. I have worked for Anomali (formerly ThreatStream) for almost the last three years and it’s been one of the best experiences of my life. But if you looked at my résumé or LinkedIn, much like anyone else, you’d do a double take. How in the world did he score a […]

North Korea, or more formally, the Democratic People’s Republic of North Korea (DPRK), is no stranger to international headlines. Most notably, it has captured attention in recent years for its nuclear testing and ballistic missile launches. Events in the cyber landscape have brought negative attention to North Korea as well. The United States officially blamed […]